NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Taylor, Arlene G. – 1999
This book addresses the history, theory, and practices of the organization of recorded information. Chapter 1, "Organization in Human Endeavors," looks at the basic human need to organize and how it is approached in various environments. Chapter 2, "Retrieval Tools," is concerned with the formats and functions of basic…
Descriptors: Classification, Computer System Design, Information Industry, Information Management
Saffady, William – 1999
This book is divided into two parts; the first part (chapters 1-4) discusses fundamental aspects of computing and related technologies, and the second part (chapters 5-8) covers library automation, systems, and services. The chapters are as follows: (1) Computer Hardware, including the central processor, input peripherals, output peripherals, and…
Descriptors: Cataloging, Computer Peripherals, Computer Software, Computer System Design
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Finlayson, Jean, Ed. – Coombe Lodge Report, 1989
This collection of papers addresses key questions facing college managers and others choosing, introducing, and living with big, complex computer-based systems. "What Use the User Requirement?" (Tony Coles) stresses the importance of an information strategy driven by corporate objectives, not technology. "Process of Selecting a…
Descriptors: College Administration, Computer System Design, Evaluation Criteria, Foreign Countries
Miami-Dade Community Coll., FL. – 1992
This book contains 37 papers on computer use in higher education originally presented at a May, 1992, conference of college and university computer users. Most of the papers describe programs or systems implemented at particular institutions and cover the following: systems for career planning, automating purchasing and financial commitments,…
Descriptors: Access to Information, Career Information Systems, Computer Networks, Computer Oriented Programs
Ohio State Univ., Columbus. Center on Education and Training for Employment. – 1995
This index allows the user to scan the competencies under each title for the 28 subjects appropriate for use in a competency list for the 12 occupations within the business/computer technologies cluster. Titles of the 28 units are as follows: employability skills; professionalism; teamwork; professional and ethical standards; economic and business…
Descriptors: Accounting, Business Administration, Competence, Competency Based Education